Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 61) sorted by relevance

123

/Linux-v4.19/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
Dmthca_provider.h102 int privileged; member
/Linux-v4.19/Documentation/ABI/testing/
Dsysfs-hypervisor-xen22 privileged (e.g. dom0), the hypervisor
25 privileged guests.
/Linux-v4.19/tools/perf/arch/x86/util/
Dintel-bts.c119 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_bts_recording_options() local
153 if (privileged) { in intel_bts_recording_options()
160 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options()
190 if (privileged) { in intel_bts_recording_options()
Dintel-pt.c558 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_pt_recording_options() local
600 if (privileged) { in intel_pt_recording_options()
607 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options()
642 if (privileged) { in intel_pt_recording_options()
/Linux-v4.19/tools/perf/arch/arm/util/
Dcs-etm.c72 bool privileged = (geteuid() == 0 || perf_event_paranoid() < 0); in cs_etm_recording_options() local
109 if (privileged) { in cs_etm_recording_options()
117 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options()
162 if (privileged) { in cs_etm_recording_options()
177 if (!privileged && in cs_etm_recording_options()
/Linux-v4.19/tools/perf/arch/arm64/util/
Darm-spe.c68 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in arm_spe_recording_options() local
92 if (privileged) { in arm_spe_recording_options()
/Linux-v4.19/Documentation/filesystems/
Dfuse.txt14 Non-privileged mount (or user mount):
16 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
218 How do non-privileged mounts work?
221 Since the mount() system call is a privileged operation, a helper
224 The implication of providing non-privileged mounts is that the mount
251 for non-privileged mounts.
306 measures, that system processes will never enter non-privileged
/Linux-v4.19/Documentation/virtual/kvm/
Dppc-pv.txt5 space code in PR=1 which is user space. This way we trap all privileged
8 Unfortunately that is also the downfall. There are quite some privileged
12 This is what the PPC PV interface helps with. It takes privileged instructions
138 also act on the shared page. So calling privileged instructions still works as
/Linux-v4.19/Documentation/powerpc/
Ddscr.txt56 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
59 Accessing DSCR through privileged SPR number (0x11) from user space
/Linux-v4.19/Documentation/s390/
Dmonreader.txt28 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
71 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
88 (Class E privileged), see "CP Command and Utility Reference".
161 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/Linux-v4.19/fs/nfs/
Dnfs4session.h27 privileged : 1, member
/Linux-v4.19/Documentation/acpi/
Daml-debugger.txt29 sufficiently privileged user).
/Linux-v4.19/arch/mips/kvm/
DKconfig60 When running in Trap & Emulate mode patch privileged
/Linux-v4.19/Documentation/sysctl/
Dfs.txt168 Maximum total number of pages a non-privileged user may allocate for pipes.
177 Maximum total number of pages a non-privileged user may allocate for pipes
272 contents of privileged processes.
279 to treat privileged core dumps with care, or specific directory
/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst42 involve ``execve()``. An appropriately privileged task can still call
/Linux-v4.19/Documentation/
DDMA-attributes.txt154 accesses to DMA buffers in both privileged "supervisor" and unprivileged
158 lesser-privileged levels).
/Linux-v4.19/Documentation/input/
Duserio.rst19 of them. userio accomplishes this by allowing any privileged userspace program
/Linux-v4.19/Documentation/infiniband/
Duser_verbs.txt68 use by non-privileged processes, it may be useful to add an
/Linux-v4.19/Documentation/admin-guide/LSM/
DSmack.rst422 capabilities is a privileged task, whereas a task with no
606 privileged process can change its own Smack label by writing to
619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
687 can only be set by privileged tasks, but any task can read them for their own
691 The Smack label of the task object. A privileged
696 A privileged program may set this to match the label of another
772 will put the Smack label of the root directory into value. A privileged
786 A privileged process can set the Smack label of outgoing packets with
DYama.rst53 did not transition uids, start privileged, or have called
/Linux-v4.19/Documentation/pti/
Dpti_intel_mid.txt37 Below is example pseudo-code on how a 'privileged' application
/Linux-v4.19/Documentation/gpu/
Ddrm-uapi.rst129 is, no modesetting or privileged ioctls can be issued on render nodes.
144 privileged ioctls on render nodes.
148 authenticates clients on the privileged primary/legacy node is no longer
/Linux-v4.19/drivers/infiniband/hw/vmw_pvrdma/
Dpvrdma.h131 int privileged; member
/Linux-v4.19/arch/powerpc/kvm/
DKconfig111 privileged instructions and registers.

123